Vmware Nsx
v1.5.11Use this skill whenever the user needs to manage VMware NSX networking — segments, gateways, NAT, routing, and IP pools. Directly handles: create/manage netw...
⭐ 0· 314·1 current·1 all-time
by@zw008
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description match the requested artifacts: a vmware-nsx CLI binary, a VMWARE_NSX_CONFIG path to ~/.vmware-nsx/config.yaml, and a credentials .env are all appropriate for an NSX Policy API management tool.
Instruction Scope
SKILL.md is focused on NSX operations and CLI usage. One inconsistency: the text asserts "No webhooks, no outbound network calls" while the config example includes an optional notify.webhook_url (and the setup guide documents it). The MCP/stdio model is local-only, but webhook config would enable outbound network calls if populated. Otherwise instructions stay within NSX management scope and reference only NSX Manager HTTPS endpoints and local config files.
Install Mechanism
The registry shows no formal install spec (instruction-only), but SKILL.md contains recommended install commands (uv tool install / pip / from source). That is reasonable for an instruction-only skill, but users should obtain the vmware-nsx binary/package from the listed GitHub repo or a trusted package index before installing.
Credentials
Only VMWARE_NSX_CONFIG is declared as required; per-target password vars (VMWARE_<TARGET>_PASSWORD) live in ~/.vmware-nsx/.env and are declared optional. Requiring the config and .env files (which contain NSX manager host/user and passwords) is proportionate for this skill. The skill asks for no unrelated cloud credentials.
Persistence & Privilege
always:false and model invocation allowed are the defaults. The skill does not request permanent system-wide changes; it proposes running a local MCP stdio server and writes audit entries to ~/.vmware/audit.db (expected for auditing). No background services or always-on privileges are requested.
Assessment
This appears to be a coherent NSX management skill, but review a few points before installing: 1) Verify the vmware-nsx binary/package source (use the listed GitHub repo or a trusted package index). 2) Keep ~/.vmware-nsx/.env (passwords) at chmod 600 and prefer certificate auth where possible; use least-privilege NSX account for automation. 3) The docs mention a webhook notify field — if you populate notify.webhook_url that will enable outbound network calls, so only set it to trusted endpoints. 4) Confirm SSL verification is enabled (verify_ssl: true) in production and supply CA bundle if needed. 5) Review audit.db location (~/.vmware/audit.db) and its permissions if audit data is sensitive. If you want stronger assurance, inspect the upstream repository code referenced in SKILL.md before use.Like a lobster shell, security has layers — review code before you run it.
latestvk974rqra4bj8mag90ehv237d3584yt09
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🌐 Clawdis
OSmacOS · Linux
Binsvmware-nsx
EnvVMWARE_NSX_CONFIG
Config~/.vmware-nsx/config.yaml, ~/.vmware-nsx/.env
Primary envVMWARE_NSX_CONFIG
